Some data protection software vendors will say that they are “agentless” because they can do an agentless backup. However, many of these vendors require agents for file-level restore, proper application backup, or to restore application data. My advice is to make sure that your data protection tool is able to address all backup and recovery scenarios without the need for an agent.

Legacy backup is costly, inefficient, and can force IT
administrators to make risky compromises that impact critical business
applications, data and resources. Read this NEW white paper to learn how Modern
Data Protection capitalizes on the inherent benefits of virtualization to:

Virtualization is a very general term for simulating a physical entity by using software. There are many different forms of virtualization that may be found in a data center including server, network and storage virtualization. When talking about server virtualization there are many unique terms and concepts that you may hear that are part of the technology that makes up server virtualization.

Virtualization is the most disruptive technology of the
decade. Virtualization-enabled data protection and disaster recovery is
especially disruptive because it allows IT to do things dramatically better at
a fraction of the cost of what it would be in a physical data center.

This chapter is designed to get you started quickly with Hyper-V 3.0. It starts with a discussion of the hardware requirements for Hyper-V 3.0 and then explains a basic Hyper-V–deployment followed by an upgrade from Hyper-V 2.0 to Hyper-V 3.0. The chapter concludes with a demonstration of migrating virtual machines from Hyper-V 2.0 to Hyper-V 3.0

The Hands-on Guide: Understanding Hyper-V in Windows Server
2012 gives you simple step-by-step instructions to help you perform
Hyper-V-related tasks like a seasoned expert. You will learn how to:

This white paper is a Windows PowerShell guide for beginners. If you are an IT Professional with little-to-no experience with PowerShell and want to learn more about this powerful scripting framework, this quick-start guide is for you. With the PowerShell engine, you can automate daily management of Windows-based servers, applications and platforms.

This white paper is a Windows PowerShell guide for beginners.
If you are an IT Professional with little-to-no experience with
PowerShell and want to learn more about this powerful scripting
framework, this quick-start guide is for you.
With the PowerShell engine, you can automate daily management of
Windows-based servers, applications and platforms. This e-book provides
the fundamentals every PowerShell administrator needs to know. The
getting started guide will give you a crash course on PowerShell
essential terms, concepts and commands and help you quickly understand
PowerShell basics.

You will also learn about:

What is PowerShell?

Using PowerShell Help

PowerShell Terminology

The PowerShell Paradigm

And more!

This
white paper focuses on PowerShell 4.0; however, you can be sure that
all the basics provided are relevant to earlier versions as well. For
those who are ready to take the next steps in learning PowerShell and
looking for more information on the topic, this PDF contains a list of
helpful resources.

You're facing VM sprawl if you're experiencing an uncontrollable increase of unused and unneeded objects in your virtual VMware environment. VM sprawl occurs often in virtual infrastructures because they expand much faster than physical, which can make management a challenge. The growing number of virtualized workloads and applications generate “virtual junk” causing VM sprawl issue. Eventually it can put you at risk of running out of resources.

You're
facing VM sprawl if you're experiencing an uncontrollable increase of
unused and unneeded objects in your virtual VMware environment. VM
sprawl occurs often in virtual infrastructures because they expand much
faster than physical, which can make management a challenge. The growing
number of virtualized workloads and applications generate “virtual
junk” causing VM sprawl issue. Eventually it can put you at risk of
running out of resources.

Getting virtual sprawl under control
will help you reallocate and better provision your existing storage, CPU
and memory resources between critical production workloads and
high-performance, virtualized applications. With proper resource
management, you can save money on extra hardware.

This white paper examines how you can avoid potential VM sprawl risks and automate proactive monitoring
by using Veeam ONE, a part of Veeam Availability Suite. Veeam ONE
will arm you with a list of VM sprawl indicators and explain how you can
pick up and configure a handy report kit to detect and eliminate VM
sprawl threats in your VMware environment.

Microsoft’s Active Directory (AD) offers IT system administrators a central way to manage user accounts and devices in an IT infrastructure network. Active Directory authenticates and authorizes users when they log onto devices and into applications, and allows them to use the settings and files across all devices in the network. Active Directory services are involved in multiple aspects of networking environments and enable interplay with other directories. Considering the important role AD pla

Microsoft’s
Active Directory (AD) offers IT system administrators a central way to
manage user accounts and devices in an IT infrastructure network. Active
Directory authenticates and authorizes users when they log onto devices
and into applications, and allows them to use the settings and files
across all devices in the network. Active Directory services are
involved in multiple aspects of networking environments and enable
interplay with other directories. Considering the important role AD
plays in user data-management and security, it’s important to deploy it
properly and consistently follow best practices.

Active Directory Basics is a tutorial
that will help you address many AD management challenges. You’ll learn
what really goes on under the Active Directory hood, including its
integration with network services and the features that enable its many
great benefits. This white paper also explains how administrators can
make changes in AD to provide consistency across an environment.

In addition, the Active Directory Basics tutorial explains how to:

Log onto devices and into applications with the same username and password combination (other optional authentication methods)

Use settings and files across all devices, which are AD members

Remain productive on secondary AD-managed devices if the primary device is lost, defective or stolen.

When Windows Server 2012 hit the market in 2012 a new feature called - Hyper-V Replica hit the shelf. In 2013, when Windows Server 2012 R2 was released, the Hyper-V Replica feature was improved. This white paper gives you an in-depth look at Hyper-V Replica: what it is, how it works, what capabilities it offers and specific-use cases.

When Windows Server 2012 hit the market in 2012 a new feature called - Hyper-V Replica
hit the shelf. In 2013, when Windows Server 2012 R2 was released, the
Hyper-V Replica feature was improved. This white paper gives you an
in-depth look at Hyper-V Replica: what it is, how it works, what
capabilities it offers and specific-use cases.

MS Applications are a critical segment of the core systems managed and run in IT of most organizations. Backing them up is not enough. The effect of the backup process on your system and storage determines its efficiency. From this whitepaper, learn how VembuHIVE transforms the way backups are performed to achieve disaster-readiness.

It is imperative that Microsoft Applications like SQL, Exchange, Active Directory and many others have been instrumental in running some of the mission-critical processes of an IT setup. While there are many solutions that address its Data Protection concerns, efficient recovery from a storage medium has always been a pivotal issue. Read this white paper that includes performance and resource utilization reports on how Vembu BDR Suite with its in-house proprietary file system VembuHIVE, reduces the backup footprints on the storage repositories enabling quick recovery with minimal RTOs.

Every minute counts when your mission-critical VMs are facing a downtime. Read this whitepaper to see how Vembu VM Replication helps you achieve the true industry-standard of 15-minute Recovery Time Objective (RTO).

When you are running critical VMs that are necessary to sustain your business, you must take all possible steps that are required to reduce their downtime. With every minute of downtime, you are losing business transactions, operations, customer trust and your brand value. Read this whitepaper to know how Vembu BDR helps protect the VM data in a simulated Online Transaction Processing scenario and achieves the industry-standard of 15 minute Recovery Time Objective.

Vembu wants to do more to let people know that it exists—it wants its own name to be in the marketplace and attached to its products—especially after hearing from many customers who desire to know whom the products they rely on truly belong to. So, in the past year, Vembu established relationships with more VARs and reached out directly to select enterprise and midmarket segments. It added 400 channel partners, 180 VARs, and 300 customers in 2014 alone.

If it appears that this analyst is impressed with Vembu, he is. Vembu’s feature set surpasses what one might presume to come from a backup company that most folks (in North America at least) haven’t heard of.And although it would be easy to assume that some of Vembu’s capabilities are mere boasts, the hesitations wash away with the recognition that this is a vendor with ten years in the business, and that well over half its workforce are R&D engineers. Said another way, Vembu appears to have been quietly solving its customers’ backup challenges for more than a decade through technology, instead of marketing.

In fact, not only did Vembu not have a marketing team until 2015, but it also didn’t have a sales team to speak of. This is an incredibly engineering-focused company—one whose revenues and customers have accumulated through word of mouth. But now, Vembu is building out a solid U.S.-based sales and marketing engine focused on penetrating awareness among IT decision makers, especially decision makers in the SMB segment.

The product Vembu will push in 2015, BDR 2.0, could be a “game changer” for Vembu’s growth. BDR appears to have the potential to quite effectively address the varied requirements of small and midmarket businesses who run mixed physical and virtual IT environments and who also want to leverage the cloud.

If Vembu continues to invest as much into its North American marketing and channel outreach programs as it historically has invested into engineering its technology, then 2015 could be the year that a lot of SMBs discover the “secret” to solving a lot of their backup problems.

European and APJ businesses may know Vembu, but many U.S. IT organizations will be surprised by the solution set of this ten-year-old company that is launching its first concerted marketing push into North America.

Being disaster-resistant is an essential requirement for any organization that is looking to ensure business continuity. Read this white paper to know how Vembu OffsiteDR helps you build a sound and resilient DR plan for your business.

As a data-driven business, a disaster plan is essential, even if it means that you’ll never need to use it. The statistics after the recent Hurricane Irma revealed that almost 40% of small businesses were never able to reopen due to extensive damages. With Vembu OffsiteDR, you can build a reliable and resilient DR strategy for your business as it replicates data from the onsite server instantaneously. You can set up a disaster recovery server in an offsite location, and when the primary server goes down, data can easily be restored from the offsite server.

Read this white paper to know more about how Vembu OffsiteDR works and why it is a suitable solution for your business.

Cloud­based backup/recovery is a cutthroat business with shrinking margins, commoditization and a surfeit of contenders trying to get a piece of the pie. The company's decision to push its resellers away from rebranding and into carrying Vembu's name on their services will give it much ­needed name/brand recognition in a crowded arena.

Vembu has grown its revenue 35% annually over the past two years and is on track to meet that mark in 2014. Key product additions this year include a suite of CRM applications and the introduction of on­premises virtual appliances (with physical appliances to come in the near future). The latter move puts Vembu in more direct competition with relatively well ­known players in the hybrid cloud backup battle.

Vembu is celebrating its 10­ year anniversary by exceeding the 60,000 ­customer milestone, sold mainly through its 4,400 channel partners. That compares with 55,000 customers and 4,000 resellers in February 2014. The company has added 400 resellers so far this year, and has begun to emphasize VARs in addition to its traditional target market of MSPs. Notable service­provider partners include Verizon's Terremark subsidiary, mindSHIFT Technologies, HostPapa and Hitachi Data Systems. The profitable Vembu claims to have exceeded 35% revenue growth in each of the past two years, and is on track for similar gains this year.

The company expects to have 200 employees by the end of 2014 (up from 160 in February), and 300 by the end of 2015. Most of its employees are near its headquarters in Chennai, India (with 65% engaged in R&D), but Vembu has been steadily expanding internationally. It opened an office in London this year, and relocated its US headquarters to Addison, Texas, where it expects to grow its workforce from 15 employees this year to 50 next year Vembu's worldwide distribution of partners roughly equates to its worldwide revenue distribution: 70% North America, 20% Europe and 10% AsiaPacific – a distribution that has remained fairly steady over the past year. However, although about 30% of its revenue comes from outside North America today, Vembu hopes to increase that to 50% in 2015. Key target markets for 2015 include the EU­5 countries, Scandinavia, Brazil and China

VembuHIVETM is an efficient cloud file system designed for large-scale backup and disaster recovery (BDRTM) application with support for advanced use-cases. VembuHIVETM can be thought of as a File System of File Systems with in-built version control, deduplication (elimination of redundant information to enhance storage reduction), encryption, and in-built error correction.

Backup is just not about storage. It’s the intelligence on top of storage. Typically when businesses think of backup, they see it as a simple data copy from one location to another. Traditional file systems would suffice if the need were to just copy the data. But backup is the intelligence applied on top of storage where data can be put to actual use. Imagine the ability to use backup data for staging, testing, development and preproduction deployment. Traditional file systems are not designed to meet such complex requirements.

With the advent of information technology, more and more organizations are relying on IT for running their businesses. They cannot afford to have downtime on their critical applications and need instant access to data in the event of disaster. Hence, a new type of file system is necessary to satisfy this need.

VembuHIVETM manages the metadata smartly through its patent-pending technology, in a way that is agnostic to the file system of the backup, which is why we call VembuHIVETM, a file system of file systems. This helps the backup application to instantly associate the data in VembuHIVETM to any file system metadata, thereby allowing on-demand file or image restores in many possible file formats. The data and metadata storage, harness cluster file system and computing and storage.

This is a really powerful concept that will address some very interesting use cases not just in the backup and recovery domain but also in other domains, such as big-data analytics.

The key to the design of VembuHIVETM is its novel mechanism to capture and generate appropriate metadata and store it intelligently in a cloud infrastructure. The increment data (the changes with respect to a previous version of the same backup) are treated like versions in a version control system (CVS, GIT). This revolutionary way of data capture and metadata generation provides seamless support to a wide range of complex restore use cases.

In this guide you will learn about Business Continuity and Disaster Recovery planning with Zerto's Disaster Recovery Solutions for Virtualized Environments. In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

In this guide you will learn about Business Continuity and Disaster Recovery planning with Zerto's Disaster Recovery Solutions for Virtualized Environments.

In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

The cost and business impact of downtime and data loss can be immenseUtilizing Zerto’s Disaster Recovery solutions can greatly mitigate downtime and data loss with RTO’s of minutes and RPO’s of seconds

Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters

Zerto’s DR solutions are applicable for both on-premise and cloud (DRaaS) virtual environments

Having a plan and process in place will help you mitigate the impact of an outage on your business

In this booklet we provide insights into the challenges, needs, strategies, and solutions for disaster recovery and business continuity, especially in modern, virtualized environments and the public cloud.

Download this white paper and learn more about Business Continuity and Disaster Recovery preparedness and how Zerto can help!

Disaster recovery scenario planning begins with identifying potential business interruption events. If you understand what the risks are, you can formulate a strategy of how to deal with them and mitigate, or at least limit, business impact. Once the disaster recovery scenarios are identified, the planning phase commences. This involves determining the probability of each scenario occurring and documenting the recovery operations.

Disaster recovery scenario planning begins with identifying potential business interruption events. If you understand what the risks are, you can formulate a strategy of how to deal with them and mitigate, or at least limit, business impact. Once the disaster recovery scenarios are identified, the planning phase commences. This involves determining the probability of each scenario occurring and documenting the recovery operations.

Although no prevention method is 100% fool proof, risk avoidance and taking proactive measures for preparedness are essential elements of the disaster recovery process. Still despite all the measures you take to avoid a disaster, you must assume that a disaster will happen. Having this mind-set will help shape your decisions when it comes to planning for IT disaster recovery.

UNC Health Care selected IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security. This document outlines key findings on how IGEL helps organizations manage entire fleets of thin clients from a single console. In addition, you will see how IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, wi

“The need to provide users with access to their desktops from any device anywhere, anytime is driving a growing number of IT organizations to migrate toward VDI environments,” said Simon Clephan, Vice President of Business Development and Strategic Alliances, IGEL. “One of the key advantages that IGEL brings to the table is the simplicity that comes from being able to manage an entire fleet of thin clients from a single console. Additionally, the IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, without having to make an upfront investment in new hardware to support their virtualized infrastructures.”

UNC Health Care selected the IGEL UDC and UMS software for its Citrix VDI deployment following a “bake-off” between thin client solutions. “IGEL won hands down due the simplicity and superiority of its management capabilities,” said James Cole, Technical Architect, UNC Health Care. “And, because the IGEL UDC software is designed to quickly and efficiently convert existing endpoint hardware into IGEL Linux OS-powered thin clients, we knew that by selecting the IGEL solution we would also realize a significant reduction in our capital expenditures.”

Since initiating the deployment of the IGEL UDC and UMS software, UNC Health Care has also experienced significant time savings. “Prior to deploying the IGEL UDC and UMS software, it took our team 25-30 minutes to create a virtual image on each system, not counting the personalization of the system for each use case, now that process takes less than 10 minutes, and even less time when converting the system to VDI roaming,” added Cole.

Additionally, the ease of integration between the IGEL UDC and IGEL UMS with Citrix XenDesktop and other solutions offered by Citrix Ecosystem partners, including Imprivata, has enabled secure access to the health care network’s Epic Systems’ Electronic Medical Records (EMR) system.